Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
Cyber Talk
Cyber Talk
The prevention-first approach for SOC that your team needs to adopt
The prevention-first approach for SOC that your team needs to adopt Alon Bar, Product Marketing, Threat...
Cyber Talk
Revolut cyber attack exposes data belonging to thousands of customers
Revolut cyber attack exposes data belonging to thousands of customers EXECUTIVE SUMMARY: The London-based FinTech startup...
Cyber Talk
How to prevent sneaky zero day attacks on fleets of smartphones
How to prevent sneaky zero day attacks on fleets of smartphones EXECUTIVE SUMMARY: Smartphones make us...
Cyber Talk
7 CISO succession planning best practices
7 CISO succession planning best practices EXECUTIVE SUMMARY: Given the volume and complexity of security incidents,...
Cyber Talk
Becoming anti-fragile: Going beyond resilience to prevent ransomware
Becoming anti-fragile: Going beyond resilience to prevent ransomware Cindi Carter, Field CISO Americas, Check Point Software...
Cyber Talk
Warning of ransomware attacks on schools, here’s how to prepare…
Warning of ransomware attacks on schools, here’s how to prepare… EXECUTIVE SUMMARY: Earlier today, US agencies...
Cyber Talk
14 ways to secure business data, in layman’s language
14 ways to secure business data, in layman’s language Mazhar Hamayun is a cyber security professional...
Cyber Talk
Warning of ransomware attacks on schools, here’s how to prepare…
Warning of ransomware attacks on schools, here’s how to prepare… EXECUTIVE SUMMARY: Earlier today, US agencies...
Cyber Talk
14 ways to secure business data, in layman’s language
14 ways to secure business data, in layman’s language Mazhar Hamayun is a cyber security professional...
Cyber Talk
Credential phishing prevention best practices
Credential phishing prevention best practices Credential phishing prevention best practices can help your employees prevent cyber...
Cyber Talk
The secret to managing deepfakes includes AI/DL & provenance
The secret to managing deepfakes includes AI/DL & provenance Keely Wilkins is an Evangelist with the...
Cyber Talk
6 different types of CISOs and the environments they thrive in
6 different types of CISOs and the environments they thrive in EXECUTIVE SUMMARY: The CISO’s role...
Cyber Talk
This is why securing critical infrastructure is so important
This is why securing critical infrastructure is so important Galina Antova is the co-founder and Chief...
Cyber Talk
17 incredible cloud native benefits that you should be aware of
17 incredible cloud native benefits that you should be aware of EXECUTIVE SUMMARY: Cloud native applications...
Cyber Talk
Top mobile security trends that you have to follow
Top mobile security trends that you have to follow Augusto Morales is a Technology Lead (Threat...
Cyber Talk
6 different types of CISOs and the environments they thrive in
6 different types of CISOs and the environments they thrive in EXECUTIVE SUMMARY: The CISO’s role...
Cyber Talk
6 different types of CISOs and the environments they thrive in
6 different types of CISOs and the environments they thrive in EXECUTIVE SUMMARY: The CISO’s role...
Cyber Talk
Fake DDoS pages on WordPress install the following…
Fake DDoS pages on WordPress install the following… EXECUTIVE SUMMARY: WordPress-based sites hacked? Security researchers say...
Cyber Talk
UK claims the unenviable title of “Fraud Capital of Europe”
UK claims the unenviable title of “Fraud Capital of Europe” By Gergo Varga, Evangelist, SEON. Plenty...
Cyber Talk
Zero Trust Segmentation: A primer for CISOs
Zero Trust Segmentation: A primer for CISOs EXECUTIVE SUMMARY: CISOs and network managers need to know...
Cyber Talk
Ex-Twitter security chief alleges ‘egregious’ and ‘reckless’ practices
Ex-Twitter security chief alleges ‘egregious’ and ‘reckless’ practices EXECUTIVE SUMMARY: Twitter’s security poses a threat to...
Cyber Talk
Educating the world about email security one call at a time
Educating the world about email security one call at a time With over 20 years of...
Cyber Talk
Ex-Twitter security chief alleges ‘egregious’ and ‘reckless’ practices
Ex-Twitter security chief alleges ‘egregious’ and ‘reckless’ practices EXECUTIVE SUMMARY: Twitter’s security poses a threat to...
Cyber Talk
It’s never too early to start securing your startup
It’s never too early to start securing your startup Many startups find it difficult to strike...
Cyber Talk
What is a BISO? + everything else to know about the role
What is a BISO? + everything else to know about the role EXECUTIVE SUMMARY: In 2020,...
Cyber Talk
MailChimp breach exposes email addresses and Callback phishing
MailChimp breach exposes email addresses and Callback phishing EXECUTIVE SUMMARY: The cloud giant known as DigitalOcean...
Cyber Talk
Healthcare payer CISO shares real-world insights: Protecting healthcare data in the cloud
Healthcare payer CISO shares real-world insights: Protecting healthcare data in the cloud In this interview, the...
Cyber Talk
Africa – the most cyber attacked continent, a 2022 review of trends
Africa – the most cyber attacked continent, a 2022 review of trends Issam El Haddioui: Head...
Cyber Talk
Using automated release management to increase data security
Using automated release management to increase data security Devin Partida writes about cyber security and technology....
Cyber Talk
10 key facts about callback phishing attacks
10 key facts about callback phishing attacks Is callback phishing on your radar screen? Hackers launch...
Posts pagination
1
…
13
14
15
16
Latest News
CSO - Online
Ransomware upstart ‘The Gentlemen’ raises the stakes for OT‑heavy sectors – Source: www.csoonline.com
10/09/2025
CSO - Online
What the Salesloft Drift breaches reveal about 4th-party risk – Source: www.csoonline.com
10/09/2025
CSO - Online
6 hot cybersecurity trends – Source: www.csoonline.com
10/09/2025
securelist.com
Notes of cyber inspector: three clusters of threat in cyberspace – Source: securelist.com
10/09/2025
securityweek.com
Adobe Patches Critical ColdFusion and Commerce Vulnerabilities – Source: www.securityweek.com
10/09/2025
securityweek.com
Exposed Docker APIs Likely Exploited to Build Botnet – Source: www.securityweek.com
10/09/2025